6 Introduction
and social relations. Taken together, the history and analysis of the OGAS
and related attempts to network and command the Soviet economy tell a
story with consequences for the history of cold war computer networks and
our understanding of the current networked world that emerged from the
cold war itself.
The second anecdote took place not far from Glushkov’s fateful meeting
in the Kremlin. Here, in a top-secret chamber in a cement bunker, or shariki
(“ spheres” or “globes”), buried deep underground somewhere outside of
Moscow, was a very different kind of computer network. In that small room,
a few uniformed personnel sat before flickering computer screens that were
powered by an independent generator purring audibly nearby but out of
sight. The single closed door was of reinforced metal with a self-locking
mechanism, and behind it a long ladder ascended into a network of under-
ground tunnels overhead. The chairs were bolted to the floor and pivoted
to allow the military officers to review a control panel lined with informa-
tion displays—satellite data and security camera feeds, telephone and radio
signals, Geiger counters and seismographs, and other instruments for mea-
suring the world above. These men sat at their consoles, operating as cogs
in a larger sociotechnical machine. They were trained so that if or when
the time arrived, they would observe the sensors, orient and input certain
coordinates and a timetable, flip switches, and press a button that would
end the world in a nuclear Armageddon.
This is Dead Hand, the semiautomatic nuclear-defense perimeter sys-
tem that was first installed in the late Soviet Union. The details above are
mostly pure invention, and yet the network system is real. Formally called
Systema “Perimetr,” the perimeter system was imagined under Brezhnev as
a fail-deadly deterrence mechanism for ensuring second-strike capacity in
the nuclear cold war.^7 These men—not unlike the U.S. workers who staffed
the Emergency Rocket Communication System from 1961 to 1991—sat in
the top-secret underground command-and-control center of their nation’s
perimeter system. The data were fed into computer consuls to confirm
whether the enemy had struck first. If an American military strike effec-
tively disabled the regular Soviet command-and-control military leader-
ship above ground from swiftly retaliating, then the strategy maintained
that the Dead Hand would stand ready to trigger “a spasm of destruction.”^8
After the national computer network system was activated, it would put on
alert nuclear-tipped intercontinental missiles that were stored thousands
of miles away. The red button, once pressed, would launch a massive retal-
iatory nuclear strike, enacting swift revenge at a global cataclysmic scale.
Behold the apocalypse—delivered by national network.